Atlassian

Atlassian

Atlassian reveals a data leak that was brought on by the theft of employee login information that was then utilized to obtain data from a third-party vendor.

More than 13,200 entries make up the employee file that was uploaded online, and a brief inspection of the file suggests that it contains data on many current employees, including names, email addresses, work departments, and other details.

The threat actors obtained information from a third-party vendor using the employee login credentials they had stolen.

The business emphasized that the event had no impact on consumer or network data.

The business acknowledged the data breach and disclosed that Envoy, a startup that offers workplace management services to the Australian software giant, was the source of the leaked data.

Source: https://securityaffairs.com/142424/data-breach/atlassian-data-leak.html

TPRM report: https://scoringcyber.rankiteo.com/company/atlassian

"id": "atl195481023",
"linkid": "atlassian",
"type": "Data Leak",
"date": "02/2023",
"severity": "60",
"impact": "3",
"explanation": "Attack with significant impact with internal employee data leaks"
{'affected_entities': [{'industry': 'Software',
                        'location': 'Australia',
                        'name': 'Atlassian',
                        'type': 'Organization'}],
 'attack_vector': 'Stolen Login Credentials',
 'data_breach': {'data_exfiltration': True,
                 'number_of_records_exposed': 13200,
                 'personally_identifiable_information': ['names',
                                                         'email addresses',
                                                         'work departments',
                                                         'other details'],
                 'sensitivity_of_data': 'Medium',
                 'type_of_data_compromised': ['employee data']},
 'description': 'Atlassian reveals a data leak that was brought on by the '
                'theft of employee login information that was then utilized to '
                'obtain data from a third-party vendor.',
 'impact': {'data_compromised': ['names',
                                 'email addresses',
                                 'work departments',
                                 'other details']},
 'initial_access_broker': {'entry_point': 'Stolen Login Credentials'},
 'motivation': 'Data Theft',
 'post_incident_analysis': {'root_causes': 'Weak credential management'},
 'references': [{'source': 'Atlassian Data Breach Report'}],
 'title': 'Atlassian Data Leak',
 'type': 'Data Breach',
 'vulnerability_exploited': 'Weak credential management'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.